1. 06 2月, 2015 1 次提交
  2. 03 2月, 2015 1 次提交
  3. 29 1月, 2015 2 次提交
  4. 28 1月, 2015 1 次提交
    • R
      OPENSSL_NO_xxx cleanup: SHA · 474e469b
      Rich Salz 提交于
      Remove support for SHA0 and DSS0 (they were broken), and remove
      the ability to attempt to build without SHA (it didn't work).
      For simplicity, remove the option of not building various SHA algorithms;
      you could argue that SHA_224/256/384/512 should be kept, since they're
      like crypto algorithms, but I decided to go the other way.
      So these options are gone:
      	GENUINE_DSA         OPENSSL_NO_SHA0
      	OPENSSL_NO_SHA      OPENSSL_NO_SHA1
      	OPENSSL_NO_SHA224   OPENSSL_NO_SHA256
      	OPENSSL_NO_SHA384   OPENSSL_NO_SHA512
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      474e469b
  5. 27 1月, 2015 1 次提交
  6. 24 1月, 2015 1 次提交
    • R
      ifdef cleanup, part 4a: '#ifdef undef' · a2b18e65
      Rich Salz 提交于
      This removes all code surrounded by '#ifdef undef'
      One case is left: memmove() replaced by open-coded for loop,
      in crypto/stack/stack.c  That needs further review.
      
      Also removed a couple of instances of /* dead code */ if I saw them
      while doing the main removal.
      Reviewed-by: NMatt Caswell <matt@openssl.org>
      a2b18e65
  7. 22 1月, 2015 5 次提交
  8. 15 1月, 2015 1 次提交
    • R
      Cleanup OPENSSL_NO_xxx, part 1 · 4b618848
      Rich Salz 提交于
      OPENSSL_NO_RIPEMD160, OPENSSL_NO_RIPEMD merged into OPENSSL_NO_RMD160
      OPENSSL_NO_FP_API merged into OPENSSL_NO_STDIO
      Two typo's on #endif comments fixed:
      	OPENSSL_NO_ECB fixed to OPENSSL_NO_OCB
      	OPENSSL_NO_HW_SureWare fixed to OPENSSL_NO_HW_SUREWARE
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      4b618848
  9. 13 1月, 2015 1 次提交
  10. 07 1月, 2015 1 次提交
  11. 06 1月, 2015 1 次提交
  12. 31 12月, 2014 1 次提交
  13. 11 12月, 2014 1 次提交
  14. 08 12月, 2014 1 次提交
  15. 29 11月, 2014 1 次提交
  16. 08 9月, 2014 2 次提交
  17. 18 8月, 2014 3 次提交
  18. 15 8月, 2014 2 次提交
  19. 07 7月, 2014 1 次提交
  20. 05 7月, 2014 1 次提交
  21. 30 6月, 2014 1 次提交
  22. 23 6月, 2014 2 次提交
  23. 15 6月, 2014 1 次提交
  24. 13 6月, 2014 1 次提交
    • V
      Client-side namecheck wildcards. · a09e4d24
      Viktor Dukhovni 提交于
      A client reference identity of ".example.com" matches a server
      certificate presented identity that is any sub-domain of "example.com"
      (e.g. "www.sub.example.com).
      
      With the X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS flag, it matches
      only direct child sub-domains (e.g. "www.sub.example.com").
      a09e4d24
  25. 11 6月, 2014 1 次提交
  26. 24 5月, 2014 1 次提交
    • L
      OpenSSL is able to generate a certificate with name constraints with any possible · dd36fce0
      Luiz Angelo Daros de Luca 提交于
      subjectAltName field. The Name Contraint example in x509v3_config(5) even use IP
      as an example:
      
      	nameConstraints=permitted;IP:192.168.0.0/255.255.0.0
      
      However, until now, the verify code for IP name contraints did not exist. Any
      check with a IP Address Name Constraint results in a "unsupported name constraint
      type" error.
      
      This patch implements support for IP Address Name Constraint (v4 and v6). This code
      validaded correcly certificates with multiple IPv4/IPv6 address checking against
      a CA certificate with these constraints:
      
      	permitted;IP.1=10.9.0.0/255.255.0.0
      	permitted;IP.2=10.48.0.0/255.255.0.0
      	permitted;IP.3=10.148.0.0/255.255.0.0
      	permitted;IP.4=fdc8:123f:e31f::/ffff:ffff:ffff::
      Signed-off-by: NLuiz Angelo Daros de Luca <luizluca@gmail.com>
      dd36fce0
  27. 21 5月, 2014 1 次提交
    • V
      Fixes to host checking. · 397a8e74
      Viktor Dukhovni 提交于
      Fixes to host checking wild card support and add support for
      setting host checking flags when verifying a certificate
      chain.
      397a8e74
  28. 26 4月, 2014 1 次提交
  29. 16 4月, 2014 1 次提交
  30. 25 2月, 2014 1 次提交